Kahoot review Flashcards
NO Operation instructions that slide the program execution to the next memory address are known as
__________ prevents senders from denying they sent the encrypted message.
Non-repudiation
A man in the middle attack, machine in the middle, monkey in the middle attack is when an _______________.
A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as ____________.
Road apple
_______ proves the contents of a message have not been changed since it was sent.
Integrity
_________ sits behind a firewall, adding another layer of analysis, removing any risky content from the data flow.
Intrusion Prevention System (IPS)
_______ will show you the number of lines from the bottom of a file.
Tail
What is it when any access to information is granted to someone who shouldn’t have access to it, such as credentials.
Sensitive Data Exposure
This vulnerability has been around since iOS7. Those in Bluetooth range could reprogram your iPhone.
AirDrop
______ happens when invalid data is sent to the application, intending to make it do something it shouldn’t.
SQL injection
ARP is a protocol that enables network communications and translates IPv$ addresses to IPv6 addresses.
true/false
False
The OG PING utility created in 1983, was used by DARPA to test performance and was called the packet internet groper.
true / false
True
Comparable to a classic firewall; has a choke point router filtering inbound traffic; before the web server and the firewall.
Retina
__________ may make forecasting the address to where a program jumps undoable.
Stack randomization
__________ verifies the origin of the message.
Authentication
Netcat functions as a back-end tool that allows data across a client and server once the connection is established.
true / false
true
Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?
Hardware or Firmware Rootkits
NDP supplements several IPv4
Host Discovery
There are four categories of IDS. What are they?
__________ is a device that monitors activity to identify questionable or even hostile events.
IDS
NMap can do all but which of the following?
Transfer files
___________ will show you the first 3 lines of a file.
Head
Snort advantages include all of the following except:
It comes confgured for every 0 day attack out there
The ICC contains information about the owner, including the PIN and the PKI digital certificates.
True